Movatterモバイル変換


[0]ホーム

URL:


US20110179268A1 - Protecting applications with key and usage policy - Google Patents

Protecting applications with key and usage policy
Download PDF

Info

Publication number
US20110179268A1
US20110179268A1US12/690,429US69042910AUS2011179268A1US 20110179268 A1US20110179268 A1US 20110179268A1US 69042910 AUS69042910 AUS 69042910AUS 2011179268 A1US2011179268 A1US 2011179268A1
Authority
US
United States
Prior art keywords
application
application package
license
package
files
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US12/690,429
Inventor
Clifford P. Strom
Mark E. Paley
Suntian Song
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Microsoft Technology Licensing LLC
Original Assignee
Microsoft Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Microsoft CorpfiledCriticalMicrosoft Corp
Priority to US12/690,429priorityCriticalpatent/US20110179268A1/en
Assigned to MICROSOFT CORPORATIONreassignmentMICROSOFT CORPORATIONASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS).Assignors: PALEY, MARK E., SONG, SUNTIAN, STROM, CLIFFORD P.
Publication of US20110179268A1publicationCriticalpatent/US20110179268A1/en
Assigned to MICROSOFT TECHNOLOGY LICENSING, LLCreassignmentMICROSOFT TECHNOLOGY LICENSING, LLCASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS).Assignors: MICROSOFT CORPORATION
Abandonedlegal-statusCriticalCurrent

Links

Images

Classifications

Definitions

Landscapes

Abstract

One or more files of an application are obtained and configured as a virtual storage volume. An application package is generated by encrypting, using a key, the one or more files configured as a virtual storage volume. A license generation module generates a license including both a usage policy for the application and the key. A computing device, to run the application, obtains and attempts to authenticate the application package. If the application package is authenticated, then a license associated with the application package is obtained and at least part of the application package is decrypted using the key in the license. A virtual storage volume that includes the application is mounted, and the application is executed in accordance with the usage policy in the license. However, if the application is not authenticated, then the application is not executed.

Description

Claims (20)

20. A method in a computing device, the method comprising:
obtaining an application package from an application package distribution service, the application package including:
an encrypted application,
metadata including an identifier of the application package, and
a digital signature generated by digitally signing the identifier of the application package and the encrypted application;
attempting to authenticate the application package by verifying the digital signature in the application package;
if the application package is authenticated, then:
obtaining a license associated with the application package, the license including a decryption key and usage policy,
mounting a virtual storage volume that includes the application,
decrypting at least part of the application package using the decryption key in the license, and
executing the application in accordance with the usage policy, and decrypting and returning to the application one or more additional parts of the application package in response to requests for data from the application; and
if the application is not authenticated, then refusing to execute the application.
US12/690,4292010-01-202010-01-20Protecting applications with key and usage policyAbandonedUS20110179268A1 (en)

Priority Applications (1)

Application NumberPriority DateFiling DateTitle
US12/690,429US20110179268A1 (en)2010-01-202010-01-20Protecting applications with key and usage policy

Applications Claiming Priority (1)

Application NumberPriority DateFiling DateTitle
US12/690,429US20110179268A1 (en)2010-01-202010-01-20Protecting applications with key and usage policy

Publications (1)

Publication NumberPublication Date
US20110179268A1true US20110179268A1 (en)2011-07-21

Family

ID=44278416

Family Applications (1)

Application NumberTitlePriority DateFiling Date
US12/690,429AbandonedUS20110179268A1 (en)2010-01-202010-01-20Protecting applications with key and usage policy

Country Status (1)

CountryLink
US (1)US20110179268A1 (en)

Cited By (24)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20120096264A1 (en)*2010-10-152012-04-19Oracle America, Inc.Java store television
US20120272072A1 (en)*2011-04-252012-10-25Samsung Electronics Co., Ltd.Apparatus and method for processing application package in portable terminal
US20130152084A1 (en)*2011-12-092013-06-13International Business Machines CorporationControlling Usage of Virtual Disks Before Their Attachment to Virtual Machines
US20130305046A1 (en)*2012-05-142013-11-14Computer Associates Think, Inc.System and Method for Virtual Machine Data Protection in a Public Cloud
US20140177839A1 (en)*2012-12-212014-06-26Mobile Iron, Inc.Secure app-to-app communication
US20150113284A1 (en)*2013-10-232015-04-23Samsung Electronics Co., Ltd.Method and apparatus for protecting application program
US20160054989A1 (en)*2014-08-222016-02-25Apple Inc.Automatic purposed-application creation
US9537835B2 (en)2012-12-212017-01-03Mobile Iron, Inc.Secure mobile app connection bus
US20180234403A1 (en)*2017-02-152018-08-16Telefonaktiebolaget Lm Ericsson (Publ)Data owner restricted secure key distribution
US20180276349A1 (en)*2015-05-182018-09-27Mitsubishi Electric CorporationDigital content editing apparatus, digital content playback apparatus, digital content decrypting apparatus, web content playback apparatus, web content decrypting apparatus, digital content encrypting/decrypting system, and digital content encrypting/decrypting method
WO2018236508A1 (en)*2017-06-212018-12-27Microsoft Technology Licensing, Llc MUTUAL AUTHENTICATION WITH ATTESTATION OF INTEGRITY
US20190028441A1 (en)*2017-07-182019-01-24Google Inc.Methods, systems, and media for protecting and verifying video files
US20190042713A1 (en)*2017-08-012019-02-07Lakeba Technology Pty LtdSecuring applications on mobile devices
US10205710B2 (en)*2015-01-082019-02-12Intertrust Technologies CorporationCryptographic systems and methods
US10440006B2 (en)2017-06-212019-10-08Microsoft Technology Licensing, LlcDevice with embedded certificate authority
US10469272B2 (en)*2017-07-282019-11-05Netapp, Inc.Methods for facilitating secure cloud compute environments and devices thereof
US10693845B2 (en)*2015-06-162020-06-23Alibaba Group Holding LimitedEnhancing security of application downloads
US10938560B2 (en)2017-06-212021-03-02Microsoft Technology Licensing, LlcAuthorization key escrow
US11144978B1 (en)*2021-02-252021-10-12Mythical, Inc.Systems and methods to support custom bundling of virtual items within an online game
US20220004598A1 (en)*2020-07-022022-01-06Charles Saron KnoblochNeural rights management
CN114880630A (en)*2022-05-162022-08-09北京百度网讯科技有限公司Method and device for acquiring software use permission
WO2022265830A1 (en)*2021-06-162022-12-22Microsoft Technology Licensing, LlcManaging asset packages for interactive bot development
US20230092264A1 (en)*2020-02-172023-03-23Hangzhou Hikvision Digital Technology Co., Ltd.Authorization verification system, method and apparatus for application, and storage medium
US12256024B2 (en)2017-06-212025-03-18Microsoft Technology Licensing, LlcDevice provisioning

Citations (12)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US5757908A (en)*1994-04-251998-05-26International Business Machines CorporationMethod and apparatus for enabling trial period use of software products: method and apparatus for utilizing an encryption header
US20020107803A1 (en)*1998-08-132002-08-08International Business Machines CorporationMethod and system of preventing unauthorized rerecording of multimedia content
US20060167817A1 (en)*2000-09-282006-07-27Microsoft CorporationRetail transactions involving digital content in a digital rights management (DRM) system
US7120250B2 (en)*2002-09-092006-10-10Sony CorporationContent distribution for multiple digital rights management
US7257717B2 (en)*2003-04-012007-08-14Fineart Technology Co., LtdMethod with the functions of virtual space and data encryption and invisibility
US7421741B2 (en)*2003-10-202008-09-02Phillips Ii Eugene BSecuring digital content system and method
US20080256592A1 (en)*2007-04-122008-10-16Microsoft CorporationManaging Digital Rights for Multiple Assets in an Envelope
US7484103B2 (en)*2002-01-122009-01-27Je-Hak WooMethod and system for the information protection of digital content
US7496540B2 (en)*2002-03-272009-02-24Convergys Cmg UtahSystem and method for securing digital content
WO2009025444A1 (en)*2007-08-202009-02-26Teruten, Inc.Method and apparutus for providing software security
US20090175442A1 (en)*2008-01-072009-07-09Microsoft CorporationDigital Rights Management System Protecting Consumer Privacy
US7590853B1 (en)*1996-08-122009-09-15Intertrust Technologies CorporationSystems and methods using cryptography to protect secure computing environments

Patent Citations (12)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US5757908A (en)*1994-04-251998-05-26International Business Machines CorporationMethod and apparatus for enabling trial period use of software products: method and apparatus for utilizing an encryption header
US7590853B1 (en)*1996-08-122009-09-15Intertrust Technologies CorporationSystems and methods using cryptography to protect secure computing environments
US20020107803A1 (en)*1998-08-132002-08-08International Business Machines CorporationMethod and system of preventing unauthorized rerecording of multimedia content
US20060167817A1 (en)*2000-09-282006-07-27Microsoft CorporationRetail transactions involving digital content in a digital rights management (DRM) system
US7484103B2 (en)*2002-01-122009-01-27Je-Hak WooMethod and system for the information protection of digital content
US7496540B2 (en)*2002-03-272009-02-24Convergys Cmg UtahSystem and method for securing digital content
US7120250B2 (en)*2002-09-092006-10-10Sony CorporationContent distribution for multiple digital rights management
US7257717B2 (en)*2003-04-012007-08-14Fineart Technology Co., LtdMethod with the functions of virtual space and data encryption and invisibility
US7421741B2 (en)*2003-10-202008-09-02Phillips Ii Eugene BSecuring digital content system and method
US20080256592A1 (en)*2007-04-122008-10-16Microsoft CorporationManaging Digital Rights for Multiple Assets in an Envelope
WO2009025444A1 (en)*2007-08-202009-02-26Teruten, Inc.Method and apparutus for providing software security
US20090175442A1 (en)*2008-01-072009-07-09Microsoft CorporationDigital Rights Management System Protecting Consumer Privacy

Cited By (52)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20120096264A1 (en)*2010-10-152012-04-19Oracle America, Inc.Java store television
US10373139B2 (en)*2010-10-152019-08-06Oracle America, Inc.Java store television
US9626488B2 (en)*2010-10-152017-04-18Oracle America, Inc.Java store television
US20120272072A1 (en)*2011-04-252012-10-25Samsung Electronics Co., Ltd.Apparatus and method for processing application package in portable terminal
US9330253B2 (en)*2011-04-252016-05-03Samsung Electronics Co., Ltd.Apparatus and method for processing application package in portable terminal
DE102012221512B4 (en)*2011-12-092020-12-10International Business Machines Corporation Control the use of virtual disks before attaching them to virtual machines
US10282221B2 (en)*2011-12-092019-05-07International Business Machines CorporationControlling usage of virtual disks before their attachment to virtual machines
US10635482B2 (en)2011-12-092020-04-28International Business Machines CorporationControlling usage of virtual disks before their attachment to virtual machines
US20130152084A1 (en)*2011-12-092013-06-13International Business Machines CorporationControlling Usage of Virtual Disks Before Their Attachment to Virtual Machines
US8838968B2 (en)*2012-05-142014-09-16Ca, Inc.System and method for virtual machine data protection in a public cloud
US20130305046A1 (en)*2012-05-142013-11-14Computer Associates Think, Inc.System and Method for Virtual Machine Data Protection in a Public Cloud
US20140177839A1 (en)*2012-12-212014-06-26Mobile Iron, Inc.Secure app-to-app communication
US9537835B2 (en)2012-12-212017-01-03Mobile Iron, Inc.Secure mobile app connection bus
US9866382B2 (en)*2012-12-212018-01-09Mobile Iron, Inc.Secure app-to-app communication
US10284369B2 (en)2013-03-012019-05-07Mobile Iron, Inc.Secure app-to-app communication
KR20150047001A (en)*2013-10-232015-05-04삼성전자주식회사Method and apparatus for protecting application program
US9953157B2 (en)*2013-10-232018-04-24Samsung Electronics Co., Ltd.Method and apparatus for protecting application program
US20150113284A1 (en)*2013-10-232015-04-23Samsung Electronics Co., Ltd.Method and apparatus for protecting application program
KR102133251B1 (en)*2013-10-232020-07-21삼성전자주식회사Method and apparatus for protecting application program
US20160054989A1 (en)*2014-08-222016-02-25Apple Inc.Automatic purposed-application creation
US9934014B2 (en)*2014-08-222018-04-03Apple Inc.Automatic purposed-application creation
US11848922B2 (en)*2015-01-082023-12-19Intertrust Technologies CorporationCryptographic systems and methods
US10205710B2 (en)*2015-01-082019-02-12Intertrust Technologies CorporationCryptographic systems and methods
US20220078168A1 (en)*2015-01-082022-03-10Intertrust Technologies CorporationCryptographic systems and methods
US11196724B2 (en)*2015-01-082021-12-07Intertrust Technologies CorporationCryptographic systems and methods
US20240106809A1 (en)*2015-01-082024-03-28Intertrust Technologies CorporationCryptographic systems and methods
US12395475B2 (en)*2015-01-082025-08-19Intertrust Technologies CorporationCryptographic systems and methods
US20180276349A1 (en)*2015-05-182018-09-27Mitsubishi Electric CorporationDigital content editing apparatus, digital content playback apparatus, digital content decrypting apparatus, web content playback apparatus, web content decrypting apparatus, digital content encrypting/decrypting system, and digital content encrypting/decrypting method
US10693845B2 (en)*2015-06-162020-06-23Alibaba Group Holding LimitedEnhancing security of application downloads
US20180234403A1 (en)*2017-02-152018-08-16Telefonaktiebolaget Lm Ericsson (Publ)Data owner restricted secure key distribution
US10484354B2 (en)*2017-02-152019-11-19Telefonaktiebolaget Lm Ericsson (Publ)Data owner restricted secure key distribution
US10558812B2 (en)2017-06-212020-02-11Microsoft Technology Licensing, LlcMutual authentication with integrity attestation
US10440006B2 (en)2017-06-212019-10-08Microsoft Technology Licensing, LlcDevice with embedded certificate authority
US12256024B2 (en)2017-06-212025-03-18Microsoft Technology Licensing, LlcDevice provisioning
US10938560B2 (en)2017-06-212021-03-02Microsoft Technology Licensing, LlcAuthorization key escrow
WO2018236508A1 (en)*2017-06-212018-12-27Microsoft Technology Licensing, Llc MUTUAL AUTHENTICATION WITH ATTESTATION OF INTEGRITY
US10715498B2 (en)*2017-07-182020-07-14Google LlcMethods, systems, and media for protecting and verifying video files
US20190028441A1 (en)*2017-07-182019-01-24Google Inc.Methods, systems, and media for protecting and verifying video files
US11368438B2 (en)*2017-07-182022-06-21Google LlcMethods, systems, and media for protecting and verifying video files
US20220329572A1 (en)*2017-07-182022-10-13Google LlcMethods, systems, and media for protecting and verifying video files
US12218920B2 (en)*2017-07-182025-02-04Google LlcMethods, systems, and media for protecting and verifying video files
US11750577B2 (en)*2017-07-182023-09-05Google LlcMethods, systems, and media for protecting and verifying video files
US20230412573A1 (en)*2017-07-182023-12-21Google LlcMethods, systems, and media for protecting and verifying video files
US10469272B2 (en)*2017-07-282019-11-05Netapp, Inc.Methods for facilitating secure cloud compute environments and devices thereof
US10915609B2 (en)*2017-08-012021-02-09Lakeba Technology Pty LtdSecuring applications on mobile devices
US20190042713A1 (en)*2017-08-012019-02-07Lakeba Technology Pty LtdSecuring applications on mobile devices
US20230092264A1 (en)*2020-02-172023-03-23Hangzhou Hikvision Digital Technology Co., Ltd.Authorization verification system, method and apparatus for application, and storage medium
US20220004598A1 (en)*2020-07-022022-01-06Charles Saron KnoblochNeural rights management
US12165187B2 (en)2021-02-252024-12-10Mythical, Inc.Systems and methods to support custom bundling of virtual items within an online game
US11144978B1 (en)*2021-02-252021-10-12Mythical, Inc.Systems and methods to support custom bundling of virtual items within an online game
WO2022265830A1 (en)*2021-06-162022-12-22Microsoft Technology Licensing, LlcManaging asset packages for interactive bot development
CN114880630A (en)*2022-05-162022-08-09北京百度网讯科技有限公司Method and device for acquiring software use permission

Similar Documents

PublicationPublication DateTitle
US20110179268A1 (en)Protecting applications with key and usage policy
US8689015B2 (en)Portable secure data files
US9853957B2 (en)DRM protected video streaming on game console with secret-less application
US9342701B1 (en)Digital rights management system and methods for provisioning content to an intelligent storage
US9805350B2 (en)System and method for providing access of digital contents to offline DRM users
US9489520B2 (en)Decryption and encryption of application data
US7971261B2 (en)Domain management for digital media
US8799651B2 (en)Method and system for encrypted file access
US8091137B2 (en)Transferring a data object between devices
US8204233B2 (en)Administration of data encryption in enterprise computer systems
EP2065828B1 (en)Media storage structures for storing content, devices for using such structures, systems for distributing such structures
US10574458B2 (en)Media storage structures for storing content, devices for using such structures, systems for distributing such structures
CN103095462B (en)Based on the data broadcast distribution guard method acting on behalf of re-encryption and safety chip
US12147508B2 (en)Systems and methods for securely processing content
US8353049B2 (en)Separating keys and policy for consuming content
US8756433B2 (en)Associating policy with unencrypted digital content

Legal Events

DateCodeTitleDescription
ASAssignment

Owner name:MICROSOFT CORPORATION, WASHINGTON

Free format text:ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:STROM, CLIFFORD P.;PALEY, MARK E.;SONG, SUNTIAN;REEL/FRAME:023829/0437

Effective date:20100118

STCBInformation on status: application discontinuation

Free format text:ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION

ASAssignment

Owner name:MICROSOFT TECHNOLOGY LICENSING, LLC, WASHINGTON

Free format text:ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:MICROSOFT CORPORATION;REEL/FRAME:034564/0001

Effective date:20141014


[8]ページ先頭

©2009-2025 Movatter.jp